Information Operations
The AOC is on the front lines of an undeclared information war. The defense of Army networks across the world is imperative. It is obvious that no “out-of-the-box” security tool will suffice to protect the integrity of the Army’s digital domain. Consequently, Army network managers need to do a lot more in terms of Enclave Site Defense. For guidance, they can turn to the Army’s standard doctrine. A shown in this paper, defending a network enclave is not much different than defending a hilltop in the jungle. The same principles of war apply. As seen in FM 100-5, the Army does not rely on weapon systems alone to guarantee success on the battlefield. Instead, commanders deploy weapons systems in conjunction with some time-honored tactics that favor offensive over defensive operations. The same should be true for Enclave Site Defense. Defending a site is more than just deploying the weapon systems. It is also about detecting the attack and reacting to it. This paper will discuss these very issues.
Friday, June 15, 2001
Computerworld Resource Center: Security
Computer World's Security site with a lot of articles. Good reading!
Computer World's Security site with a lot of articles. Good reading!
Hacking Into Wall Street
On March 10, 2000, the Nasdaq reached an all-time high, breaking the 5000 mark for the very first time. Internet Trading Technologies (ITTI) wasn't participating in the market upswing, however. The company was too busy working to fend off an online attack.
On March 10, 2000, the Nasdaq reached an all-time high, breaking the 5000 mark for the very first time. Internet Trading Technologies (ITTI) wasn't participating in the market upswing, however. The company was too busy working to fend off an online attack.
Hacking threat rises with layoffs
When someone cracked Slip.net's computer system, altered customer accounts and deleted important databases, the Internet service provider didn't need to look far to find the attacker.
It wasn't a criminal outfit seeking credit card numbers, and it wasn't a scrawny whiz kid hacking away for a challenge in his dark bedroom.
It was Nicholas Middleton, a former computer administrator for Slip.net, who had been unhappy at the San Francisco company and recently quit. Middleton fought the resulting criminal charges on a legal technicality but lost and got three years' probation.
When someone cracked Slip.net's computer system, altered customer accounts and deleted important databases, the Internet service provider didn't need to look far to find the attacker.
It wasn't a criminal outfit seeking credit card numbers, and it wasn't a scrawny whiz kid hacking away for a challenge in his dark bedroom.
It was Nicholas Middleton, a former computer administrator for Slip.net, who had been unhappy at the San Francisco company and recently quit. Middleton fought the resulting criminal charges on a legal technicality but lost and got three years' probation.
U.S. Considered Sharing Security Secrets With China, Syria, Pakistan
Newly declassified documents show that America considered sharing secret computer security code "keys" with foreign powers including China, Syria and Pakistan.
The documents include a secret 1993 CIA cable on the "Clipper" project, a computer security chip developed by the U.S. government. The Clipper chip contained advanced "key recovery" surveillance technology, allowing the government to secretly tap phone conversations and monitor computer communications.
Newly declassified documents show that America considered sharing secret computer security code "keys" with foreign powers including China, Syria and Pakistan.
The documents include a secret 1993 CIA cable on the "Clipper" project, a computer security chip developed by the U.S. government. The Clipper chip contained advanced "key recovery" surveillance technology, allowing the government to secretly tap phone conversations and monitor computer communications.
HoneyNet Project
The Honeynet Project is a group of thirty security professionals dedicated to learning the tools, tactics, and motives of the blackhat community and sharing those lessons learned. The team collects this information on their own time with their own resources. The primary method for obtaining information is through the use of a Honeynet. It is our hope and intent to develop the security community in the two following ways.
Raise awareness.
To raise awareness of the threats and vulnerabilities that exist in the Internet today. We raise awareness by demonstrating real systems that were compromised in the wild by the blackhat community. Many people believe it can't happen to them. We hope to change their mind.
Teach and inform.
For those in the community who are already aware and concerned, we hope to give you the information to better secure and defend your resources.
The Honeynet Project is a group of thirty security professionals dedicated to learning the tools, tactics, and motives of the blackhat community and sharing those lessons learned. The team collects this information on their own time with their own resources. The primary method for obtaining information is through the use of a Honeynet. It is our hope and intent to develop the security community in the two following ways.
Raise awareness.
To raise awareness of the threats and vulnerabilities that exist in the Internet today. We raise awareness by demonstrating real systems that were compromised in the wild by the blackhat community. Many people believe it can't happen to them. We hope to change their mind.
Teach and inform.
For those in the community who are already aware and concerned, we hope to give you the information to better secure and defend your resources.
Tuesday, June 12, 2001
Pentagon plans to X-out data on old computers
The Pentagon believes it has found a way to give its old computers away to American schools and still protect information locked in the machines' hard drives.
The Pentagon believes it has found a way to give its old computers away to American schools and still protect information locked in the machines' hard drives.
Hackers attempted to breach California power grid
As Californians suffered under rolling blackouts last month, computer hackers were trying to breach the computer system at the California Independent System Operator (Cal-ISO), which oversees most of state's power transmission grid.
As Californians suffered under rolling blackouts last month, computer hackers were trying to breach the computer system at the California Independent System Operator (Cal-ISO), which oversees most of state's power transmission grid.
Foreign spies serious threat to U.S.
A 30-year veteran of the intelligence field says most Americans "almost ignore ... the power of intelligence and counterintelligence" in this country, despite the danger foreign intelligence agents pose to the nation's security.
A 30-year veteran of the intelligence field says most Americans "almost ignore ... the power of intelligence and counterintelligence" in this country, despite the danger foreign intelligence agents pose to the nation's security.
Subscribe to:
Posts (Atom)